Transcription

1 Motorola MSC-131 Design and Deploy AirDefense Solutions Exam TYPE: DEMO Examskey Motorola MSC-131 exam demo product is here for you to test the quality of the product. This Motorola MSC-131 demo also ensures that we have this product ready unlike most companies, which arrange the product for you as you order These MSC-131 exam questions are prepared by Motorola subject matter specialists. Hence these are most accurate version of the MSC-131 exam questions that you can get in the market. We also offer bundle discount packages for every Motorola certification track, so you can buy all related exam questions in one convenient bundle. And for corporate clients we also offer bundles for Motorola certification exams at huge discount. Check out our MSC-131 Exam Page and Motorola Certification Page for more details of these bundle packages. 1

2 Question: 1 When would the configuration of ADSP include the use of a RADIUS server? A. When LDAP is not available B. When sensor validation is required C. When sensors require a VPN connection D. When centralized authentication is required Question: 2 What is the purpose of the Bonding command in the ADSP CLI? A. The Bonding command is used to link sensors to the correct container in the ADSP tree. B. The Bonding command is used to enable the Primary and Secondary ADSP appliances to synchronize. C. The Bonding command is used to enable both of the NIC's on ADSP's system board to act as one for high availability. D. The Bonding command is used to ensure that both the Primary and Secondary ADSP appliances are configured to use the same IP address. Question: 3 What security exists for the communication between sensors and the ADSP appliance? A. EAP-TTLS and SSL B. PEAP and SSL C. PKI and SSL D. EAP-TLS and SSL Question: 4 2

3 Spectrum Analysis can be performed using different modes of operation. Which of following modes would be the most appropriate to use if you need to perform a Spectrum Analysis and capture information about the data link layer (Layer 2 of OSI model)? A. Dual Layer Scan Mode B. Continuous Scan Mode C. Background Scan Mode D. Interference Scan Mode Question: 5 Broadcasting the SSID and allowing the access point to respond to clients with no SSID makes it easier for the clients, but some consider it a security loophole. The theory for disallowing these two practices is that it helps hide the network. What is the problem with this theory? A. Hiding the SSID turns off the beacons thus disabling passive scanning B. Not responding to null SSIDs causes the EAP process to break down C. These values must be present in order for intrusion detection systems to function D. The SSID will still be present in probe request frames and can be seen with a protocol analyzer Question: 6 You have configured your ADSP appliance to use a RADIUS server to validate user credentials upon GUI logon. However, users continue to be validated directly by ADSP. What additional step must be taken to ensure GUI users are authenticated via the RADIUS server you configured when they are logging into ADSP? A. The ADSP appliance must be rebooted to ensure the settings are recorded properly B. Each user account must be configured to use the correct RADIUS server for authentication C. You must log into the CLI using the SMXMGR account and run the Enforce Credentials command D. Log into the GUI with your admin account and click on the Synchronize RADIUS Accounts button in Appliance Manager Answer: B Question: 7 3

4 A requirement for seamless roaming in a Robust Security network is that the access points receive the Pairwise Master Key (PMK) identifier from the station in the reassociation frame. What other information must be included in that frame? A. Any 802.1g VLAN tags. B. The IP address and subnet mask. C. The randomly generated shared secret. D. The MAC address of the old access point. Question: 8 Which of the following appropriately characterizes a rogue access point (AP)? A. An AP that is causing Co-Channel interference with your APs. B. An AP that is not the same brand as your customers APs. C. An AP that is on your wired network without proper authorization. D. An AP that is not using the security required by corporate policy. Question: 9 A new coffee shop opens in your building offering hotspot internet access. Several of your users are connecting to the hotspot while at their desks to bypass your firewall rules. What is the best thing that can be done using the ADSP system to prevent this? A. Integrate with the firewall using SNMP and import the same firewall rules. B. Create a termination policy to prevent accidental associations of authorized AP's. C. Create a termination policy to prevent authorized stations from using ad-hoc networks. D. Create a termination policy to prevent accidental associations of your work stations to unauthorized networks. Question: 10 There was a rogue AP on your network as detected by ADSP. The rogue was displayed in your Alarms. When you run a wireless security posture details report for the same time range, the rogue does not appear in the report. What is the most likely cause for the rogue not being in the report? 4

5 A. The report was run for a different scope than the one that detected the rogue. B. Your account was not created in the scope level where the rogue was detected. C. You are logged into ADSP as a guest account which lacks the permission to run the report. D. The rogue device has been removed from the network and the corresponding alarm is now inactive. Answer: A 5

Managing Wireless Clients with the Administrator Tool Intel PROSet/Wireless Software 10.1 This document is provided as is with no warranties whatsoever, including any warranty of merchantability, noninfringement

Chapter 4 Management This chapter describes how to use the management features of your NETGEAR WG102 ProSafe 802.11g Wireless Access Point. To get to these features, connect to the WG102 as described in

Ten Deadly Sins in Wireless Security The emergence and popularity of wireless devices and wireless networks has provided a platform for real time communication and collaboration. This emergence has created

Application Note Secure Enterprise Guest Access August 2004 Introduction More and more enterprises recognize the need to provide easy, hassle-free high speed internet access to people visiting their offices,

United States Trustee Program s Wireless LAN Security Checklist In support of a standing trustee s proposed implementation of Wireless Access Points (WAP) in ' 341 meeting rooms and courtrooms, the following

Scalable Unified Wired/Wireless Network Architecture Manages up to 48 D-Link Unified Access Points Up to 192 Unified Access Points can be managed by a cluster of four DWS-3160 switches Robust Wired/Wireless

Chapter 3 Management This chapter describes how to use the management features of your ProSafe 802.11a/g Dual Band Wireless Access Point WAG102. To access these features, connect to the WAG102 as described

Configuring a Windows 2003 Server for IAS When setting up a Windows 2003 server to function as an IAS server for our demo environment we will need the server to serve several functions. First of all we

1. APPLE AIRPORT EXTREME 1.1 Product Description The following are device specific configuration settings for the Apple Airport Extreme. Navigation through the management screens will be similar but may

The following document provides details about the operation and configuration parameters for Penn State Wireless 2.0 and Visitor Wireless. It is intended for Penn State network administrators who are considering

Introduction The PW0-204 exam, covering the 2010 objectives, will certify that the successful candidate understands the security weaknesses inherent in WLANs, the solutions available to address those weaknesses,

1. CISCO 1.1 Product Description Because Cisco Systems is a major supplier of enterprise level wireless products, which meet the benchmark requirements for the high sensitivity environment, this section

Mikrotik Basics Terms Used Layer X When I refer to something being at layer X I m referring to the OSI model. VLAN 802.1Q Layer 2 marking on traffic used to segment sets of traffic. VLAN tags are applied

Article ID: 5047 Configure Workgroup Bridge on the WAP351 Objective The Workgroup Bridge feature enables the Wireless Access Point (WAP) to bridge traffic between a remote client and the wireless LAN that

: Understanding Security to Ensure Compliance with HIPAA Healthcare is a natural environment for wireless LAN solutions. With a large mobile population of doctors, nurses, physician s assistants and other

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam Version 4.1 QUESTION NO: 1 Which of the following devices would be used to gain access to a secure network without affecting network connectivity? A. Router

SSL-VPN Combined With Network Security Introducing A popular feature of the SonicWALL Aventail SSL VPN appliances is called End Point Control (EPC). This allows the administrator to define specific criteria